Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E445A GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_001E445A |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EC6D1 FindFirstFileW,FindClose, | 1_2_001EC6D1 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 1_2_001EC75C |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_001EEF95 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_001EF0F2 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_001EF3F3 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_001E37EF |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_001E3B12 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_001EBCBC |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082445A GetFileAttributesW,FindFirstFileW,FindClose, | 3_2_0082445A |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082C6D1 FindFirstFileW,FindClose, | 3_2_0082C6D1 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 3_2_0082C75C |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_0082EF95 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_0082F0F2 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 3_2_0082F3F3 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_008237EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_008237EF |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_00823B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_00823B12 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 3_2_0082BCBC |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.com |
Source: RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comP |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comX |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.comd |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D7E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2538888760.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/ |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/d |
Source: vaccinatory.exe, 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2536556876.0000000000413000.00000040.80000000.00040000.00000000.sdmp, vaccinatory.exe, 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.org/q |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://checkip.dyndns.orgd |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.org |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://reallyfreegeoip.orgd |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: RegSvcs.exe, 00000004.00000002.2536556876.0000000000413000.00000040.80000000.00040000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocume |
Source: vaccinatory.exe, 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, vaccinatory.exe, 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id= |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org |
Source: vaccinatory.exe, 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2536556876.0000000000413000.00000040.80000000.00040000.00000000.sdmp, vaccinatory.exe, 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d |
Source: RegSvcs.exe, 00000004.00000002.2538888760.0000000002E60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2538612035.0000000002D90000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_0020CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 1_2_0020CABC |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0084CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 3_2_0084CABC |
Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 9.2.vaccinatory.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 9.2.vaccinatory.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 9.2.vaccinatory.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 9.2.vaccinatory.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 3.2.vaccinatory.exe.9e0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 3.2.vaccinatory.exe.9e0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 3.2.vaccinatory.exe.9e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 3.2.vaccinatory.exe.9e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: Process Memory Space: vaccinatory.exe PID: 7700, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: vaccinatory.exe PID: 8052, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: This is a third-party compiled AutoIt script. | 1_2_00183B3A |
Source: tNXl4XhgmV.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: tNXl4XhgmV.exe, 00000001.00000002.1289566546.0000000000234000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_cf568c7a-9 |
Source: tNXl4XhgmV.exe, 00000001.00000002.1289566546.0000000000234000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_01ca7200-8 |
Source: tNXl4XhgmV.exe, 00000001.00000003.1288936794.00000000038B3000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_6495f73a-1 |
Source: tNXl4XhgmV.exe, 00000001.00000003.1288936794.00000000038B3000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_4dc044da-7 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: This is a third-party compiled AutoIt script. | 3_2_007C3B3A |
Source: vaccinatory.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: vaccinatory.exe, 00000003.00000002.1311718824.0000000000874000.00000002.00000001.01000000.00000005.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_20bc627e-9 |
Source: vaccinatory.exe, 00000003.00000002.1311718824.0000000000874000.00000002.00000001.01000000.00000005.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_e7bff6c4-4 |
Source: vaccinatory.exe, 00000009.00000002.1425689472.0000000000874000.00000002.00000001.01000000.00000005.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_290bfd57-1 |
Source: vaccinatory.exe, 00000009.00000002.1425689472.0000000000874000.00000002.00000001.01000000.00000005.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_40b8128c-d |
Source: tNXl4XhgmV.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_5af4b232-8 |
Source: tNXl4XhgmV.exe | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_a99e274e-3 |
Source: vaccinatory.exe.1.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_233b0026-d |
Source: vaccinatory.exe.1.dr | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_f487b8de-8 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_0018E6A0 | 1_2_0018E6A0 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001AD975 | 1_2_001AD975 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A21C5 | 1_2_001A21C5 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001B62D2 | 1_2_001B62D2 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_002003DA | 1_2_002003DA |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001B242E | 1_2_001B242E |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A25FA | 1_2_001A25FA |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001DE616 | 1_2_001DE616 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001966E1 | 1_2_001966E1 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001B878F | 1_2_001B878F |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00198808 | 1_2_00198808 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001B6844 | 1_2_001B6844 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00200857 | 1_2_00200857 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E8889 | 1_2_001E8889 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001ACB21 | 1_2_001ACB21 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001B6DB6 | 1_2_001B6DB6 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00196F9E | 1_2_00196F9E |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00193030 | 1_2_00193030 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A3187 | 1_2_001A3187 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001AF1D9 | 1_2_001AF1D9 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00181287 | 1_2_00181287 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A1484 | 1_2_001A1484 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00195520 | 1_2_00195520 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A7696 | 1_2_001A7696 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00195760 | 1_2_00195760 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A1978 | 1_2_001A1978 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001B9AB5 | 1_2_001B9AB5 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_0018FCE0 | 1_2_0018FCE0 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001A1D90 | 1_2_001A1D90 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001ABDA6 | 1_2_001ABDA6 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00207DDB | 1_2_00207DDB |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_0018DF00 | 1_2_0018DF00 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00193FE0 | 1_2_00193FE0 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_01163B28 | 1_2_01163B28 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007CE6A0 | 3_2_007CE6A0 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007ED975 | 3_2_007ED975 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E21C5 | 3_2_007E21C5 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007F62D2 | 3_2_007F62D2 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_008403DA | 3_2_008403DA |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007F242E | 3_2_007F242E |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E25FA | 3_2_007E25FA |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0081E616 | 3_2_0081E616 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D66E1 | 3_2_007D66E1 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007F878F | 3_2_007F878F |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_00828889 | 3_2_00828889 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007F6844 | 3_2_007F6844 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D8808 | 3_2_007D8808 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_00840857 | 3_2_00840857 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007ECB21 | 3_2_007ECB21 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007F6DB6 | 3_2_007F6DB6 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D6F9E | 3_2_007D6F9E |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D3030 | 3_2_007D3030 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007EF1D9 | 3_2_007EF1D9 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E3187 | 3_2_007E3187 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007C1287 | 3_2_007C1287 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E1484 | 3_2_007E1484 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D5520 | 3_2_007D5520 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E7696 | 3_2_007E7696 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D5760 | 3_2_007D5760 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E1978 | 3_2_007E1978 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007F9AB5 | 3_2_007F9AB5 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007CFCE0 | 3_2_007CFCE0 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_00847DDB | 3_2_00847DDB |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007EBDA6 | 3_2_007EBDA6 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007E1D90 | 3_2_007E1D90 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007CDF00 | 3_2_007CDF00 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007D3FE0 | 3_2_007D3FE0 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_01281010 | 3_2_01281010 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_013127B9 | 4_2_013127B9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_01312DD1 | 4_2_01312DD1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_0131ACA0 | 4_2_0131ACA0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_013119B8 | 4_2_013119B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_01319BEC | 4_2_01319BEC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_0131A584 | 4_2_0131A584 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 4_2_0131AC90 | 4_2_0131AC90 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 9_2_012635B8 | 9_2_012635B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010AE228 | 10_2_010AE228 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010A27B9 | 10_2_010A27B9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010A2DD1 | 10_2_010A2DD1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010AB3C8 | 10_2_010AB3C8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010A9F80 | 10_2_010A9F80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010AA8A4 | 10_2_010AA8A4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010AB3B8 | 10_2_010AB3B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_010AF680 | 10_2_010AF680 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_063C5DEC | 10_2_063C5DEC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_063CB650 | 10_2_063CB650 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_063C31E0 | 10_2_063C31E0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_063C6C70 | 10_2_063C6C70 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Code function: 10_2_063C4A60 | 10_2_063C4A60 |
Source: 10.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 9.2.vaccinatory.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 9.2.vaccinatory.exe.36b0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 9.2.vaccinatory.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 9.2.vaccinatory.exe.36b0000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 3.2.vaccinatory.exe.9e0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 3.2.vaccinatory.exe.9e0000.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 3.2.vaccinatory.exe.9e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 3.2.vaccinatory.exe.9e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000003.00000002.1312119770.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000009.00000002.1428044082.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: Process Memory Space: vaccinatory.exe PID: 7700, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: vaccinatory.exe PID: 8052, type: MEMORYSTR | Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: unknown | Process created: C:\Users\user\Desktop\tNXl4XhgmV.exe "C:\Users\user\Desktop\tNXl4XhgmV.exe" | |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Process created: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe "C:\Users\user\Desktop\tNXl4XhgmV.exe" | |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tNXl4XhgmV.exe" | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process created: C:\Windows\SysWOW64\reg.exe REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\reg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vaccinatory.vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe "C:\Users\user\AppData\Local\ghauts\vaccinatory.exe" | |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\ghauts\vaccinatory.exe" | |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process created: C:\Windows\SysWOW64\reg.exe REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f | |
Source: C:\Windows\SysWOW64\reg.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Process created: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe "C:\Users\user\Desktop\tNXl4XhgmV.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tNXl4XhgmV.exe" | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process created: C:\Windows\SysWOW64\reg.exe REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe "C:\Users\user\AppData\Local\ghauts\vaccinatory.exe" | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\ghauts\vaccinatory.exe" | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process created: C:\Windows\SysWOW64\reg.exe REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 1_2_001848D7 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_00205376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 1_2_00205376 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_007C48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 3_2_007C48D7 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_00845376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 3_2_00845376 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E445A GetFileAttributesW,FindFirstFileW,FindClose, | 1_2_001E445A |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EC6D1 FindFirstFileW,FindClose, | 1_2_001EC6D1 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 1_2_001EC75C |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_001EEF95 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 1_2_001EF0F2 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_001EF3F3 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_001E37EF |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 1_2_001E3B12 |
Source: C:\Users\user\Desktop\tNXl4XhgmV.exe | Code function: 1_2_001EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 1_2_001EBCBC |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082445A GetFileAttributesW,FindFirstFileW,FindClose, | 3_2_0082445A |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082C6D1 FindFirstFileW,FindClose, | 3_2_0082C6D1 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 3_2_0082C75C |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_0082EF95 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 3_2_0082F0F2 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 3_2_0082F3F3 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_008237EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_008237EF |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_00823B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 3_2_00823B12 |
Source: C:\Users\user\AppData\Local\ghauts\vaccinatory.exe | Code function: 3_2_0082BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 3_2_0082BCBC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |